Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber 2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.
References
| Link | Resource |
|---|---|
| https://gist.github.com/TimRecktenwald/9615b9915a4cacda9f57bb57f13ab6d4 | Exploit Third Party Advisory |
| https://github.com/microweber/microweber/commit/aa0791fc286d785ccd33ccc706f7bb3ed05b1d7f | Patch |
Configurations
History
No history.
Information
Published : 2026-02-05 17:16
Updated : 2026-02-10 18:56
NVD link : CVE-2025-70791
Mitre link : CVE-2025-70791
CVE.ORG link : CVE-2025-70791
JSON object : View
Products Affected
microweber
- microweber
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
